Background:SARS-CoV-2 infection has caused a global pandemic that continues to negatively impact human health. A large group of microbial domains including bacteria co-evolved and interacted in complex molecular pathogenesis along with SARS-CoV-2. Evidence suggests that periodontal disease bacteria are involved in COVID-19, and are associated with chronic inflammatory systemic diseases. This study was performed to investigate the association between bacterial loads of Porphyromonas gingivalis and pathogenesis of SARS-CoV-2 infection. Fifty patients with confirmed COVID-19 by reverse transcriptase-polymerase chain reaction, their age ranges between 20-76 years, and 35 healthy volunteers (matched accordingly with age and sex to the patients) participated in this case control study. Oral hygiene status was determined by the simplified oral hygiene index. Blood and saliva samples were obtained from patients and controls, Porphyromonas gingivalis quantification from extracted DNA of blood and saliva samples performed by means of real-time polymerase chain reaction. The present result revealed that the quantity of salivary Porphyromonas gingivalis was significantly higher (p=0.003) in the patients’ group than in the controls group, while there was no significant difference in the number of bacteria in the blood samples between the two groups. Moreover, the number of bacteria in severe cases was higher than that in moderate and mild with no significant differences, and there was a significant increase in the number of bacteria among patients with poor oral hygiene compared to patients with good oral hygiene. This study demonstrated that the high level of salivary Porphyromonas gingivalis in patients increases in number with disease severity, which may indicate that bacterial infections contribute to the spread of the disease.
Background: Friedreich ataxia (FRDA) is the most common form of inherited ataxia, comprising one-half of all hereditary ataxias with a carrier rate between 1 in 60 to 1 in 90 and with a disease prevalence of 1 per 29,000. It can occur in two forms the classic form or in association with a vitamin E dependent ataxia. The precise role of Vitamin E in the nervous system is unknown; An Oxidative attack is suspected to play a role in Ataxia with Vitamin E deficiency, as well as in Friedreich ataxia. Vitamin E is the major free-radical-trapping antioxidant.
Objective: Theobjectives of the study is to asses vitamin E level in patients with Friedreichs ataxia phenotype in Iraqi patients.
... Show More
Introduction and Aim: Pseudomonas aeruginosa is a nosocomial infection with an ability to develop high levels of antibiotic resistance. The efflux pump system is one of the mechanisms that is linked to multidrug resistance in P. aeruginosa. In this study, we employed siRNA loaded on gold nanoparticles against the MexA efflux pump gene to decrease the MexA gene expression in P. aeruginosa and estimated antibiotic resistance after gene silencing. Materials and Methods: This study examined four strains of P. aeruginosa isolated from patients in various hospitals in Baghdad. Bacteria isolated were identified by biochemical tests and Vitek compact 2 system. Single-stranded siRNA (33bp) designed in this study was loaded onto gold
... Show MoreObjective: Evaluation of women's knowledge about risk factors and early detection of breast cancer at
Ibn Rushd college of education in Baghdad University.
Methodology: The study sample included (184) women in the Ibn Rushd College / University of
Baghdad, whose age ranged between (17-58) years. Data were collected through a structured
questionnaire prepared by the National Cancer Research Center which were answered during a scientific
symposium about breast cancer. The score was calculated by correcting the results of the answer, giving
one score for each correct answer and then estimating the level of knowledge and inputting all data in a
statistical program.
Results: The results showed limited level of women's
In this paper, new brain tumour detection method is discovered whereby the normal slices are disassembled from the abnormal ones. Three main phases are deployed including the extraction of the cerebral tissue, the detection of abnormal block and the mechanism of fine-tuning and finally the detection of abnormal slice according to the detected abnormal blocks. Through experimental tests, progress made by the suggested means is assessed and verified. As a result, in terms of qualitative assessment, it is found that the performance of proposed method is satisfactory and may contribute to the development of reliable MRI brain tumour diagnosis and treatments.
Data mining has the most important role in healthcare for discovering hidden relationships in big datasets, especially in breast cancer diagnostics, which is the most popular cause of death in the world. In this paper two algorithms are applied that are decision tree and K-Nearest Neighbour for diagnosing Breast Cancer Grad in order to reduce its risk on patients. In decision tree with feature selection, the Gini index gives an accuracy of %87.83, while with entropy, the feature selection gives an accuracy of %86.77. In both cases, Age appeared as the most effective parameter, particularly when Age<49.5. Whereas Ki67 appeared as a second effective parameter. Furthermore, K- Nearest Neighbor is based on the minimu
... Show MoreThe density functional B3LYP is used to investigate the effect of decorating the silver (Ag) atom on the sensing capability of an AlN nanotube (AlN-NT) in detecting thiophosgene (TP). There is a weak interaction between the pristine AlN-NT and TP with the sensing response (SR) of approximately 9.4. Decoration of the Ag atom into the structure of AlN-NT causes the adsorption energy of TP to decrease from − 6.2 to − 22.5 kcal/mol. Also, the corresponding SR increases significantly to 100.5. Moreover, the recovery time when TP is desorbed from the surface of the Ag-decorated AlN-NT (Ag@AlN-NT) is short, i.e., 24.9 s. The results show that Ag@AlN-NT can selectively detect TP among other gases, such as N2, O2, CO2, CO, and H2O.
Researchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l
... Show MoreThe use of credit cards for online purchases has significantly increased in recent years, but it has also led to an increase in fraudulent activities that cost businesses and consumers billions of dollars annually. Detecting fraudulent transactions is crucial for protecting customers and maintaining the financial system's integrity. However, the number of fraudulent transactions is less than legitimate transactions, which can result in a data imbalance that affects classification performance and bias in the model evaluation results. This paper focuses on processing imbalanced data by proposing a new weighted oversampling method, wADASMO, to generate minor-class data (i.e., fraudulent transactions). The proposed method is based on th
... Show MoreTested effective Alttafaria some materials used for different purposes, system a bacterial mutagenesis component of three bacterial isolates belonging to different races and materials tested included drug Briaktin
With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show More